Rubeus is a Windows-only post-exploitation tool for attacking Kerberos. No compiled binaries are available (either through the GitHub repo or Kali Linux’s windows-binaries package).
IMPORTANT
To use Rebueus you need to already be on the domain you are attacking, or alternately need to have mapped the domain controller (which normally hosts the KDC) IP address properly in
C:\Windows\System32\drivers\etc\hosts
.
Harvest Kerberos tickets
How to harvest Kerberos tickets with Rubeus
Link to original
Password spraying
Password spraying with Rubeus
Link to original
Kerberoasting
Kerberoasting with Rubeus
The password hashes output here can then be cracked with Hashcat (use the 13100 hash mode).
Link to original
AS-REP roasting
AS-REP roasting With Rubeus
To use Hashcat to crack the hashes obtained in this fashin, first insert
Link to original23$
after the leading$kerb5asrep$
(so$kerb5asrep$
→$kerb5asrep$23$
) and then use mode 18200.
Use a certificate to request a ticket
How to use a certificate to request a ticket with Rubeus
Start by using Certify.exe on the target:
Take the output of the last command above and paste it into a
$CERTIFICATE_PEM_FILE
on the attacking box. Then:Move
$CERTIFICATE_PFX_FILE
back to the target, and then use Rubeus to seal the deal:This is very useful if we’ve used an AD CS misconfiguration as described by SpectreOps’ “Certified Pre-Owned” research to forge a certificate that’s valid for another user.
Link to original
Change a user’s password
How to change a user’s password with Rubeus
Link to original